Database Security and Integrity: Ensuring Reliable and Secure Data Management

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : August 21, 2024 at 5:19 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 03 | Page : –

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar,

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Assistant Professor, Assistant Professor Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam, Computer Science, Catholicate College, Pathanamthitta Mahatma Gandhi University, Kottayam, Computer Science, Musaliar College, Pathanamthitta Mahatma Gandhi University, Kottayam Kerala, Kerala, Kerala India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThis paper explores the critical aspects of database security and integrity, addressing major threats and presenting strategies to mitigate these risks. Emphasizing the importance of secure and reliable data management, the paper reviews historical perspectives, current trends, key challenges, and future directions in the field. The research underscores the necessity of robust security measures and integrity controls to maintain the trustworthiness and reliability of databases, which are pivotal in supporting various organizational operations. Key concepts such as access control, encryption, and auditing are discussed, along with integrity measures like constraints and ACID properties. The paper also examines successful case studies and emerging technologies that could revolutionize database security. Through this comprehensive review, the paper aims to provide valuable insights and recommendations for enhancing database security and integrity in contemporary digital environments. The need for ongoing research and development is emphasized to address evolving threats and leverage advancements in technology, ensuring that databases remain secure, reliable, and efficient. By highlighting both theoretical and practical aspects, the paper serves as a crucial resource for professionals and researchers seeking to fortify database systems against potential vulnerabilities.

n

n

n

Keywords: Database security, data integrity, access control, encryption, auditing, ACID properties, blockchain, cybersecurity

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Advanced Database Management & Systems(joadms)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Advanced Database Management & Systems(joadms)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar. Database Security and Integrity: Ensuring Reliable and Secure Data Management. Journal of Advanced Database Management & Systems. August 21, 2024; 11(03):-.

n

How to cite this URL: Ajish M. Thomas, Blessy Abraham, Azhar Bin Sagar. Database Security and Integrity: Ensuring Reliable and Secure Data Management. Journal of Advanced Database Management & Systems. August 21, 2024; 11(03):-. Available from: https://journals.stmjournals.com/joadms/article=August 21, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn

n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. R. Elmasri and S. B. Navathe, *Fundamentals of Database Systems*, 7th ed., Pearson, 2016.
  2. H. F. Korth, A. Silberschatz, and S. Sudarshan, *Database System Concepts*, 6th ed., McGraw-Hill, 2010.
  3. E. Bertino and R. Sandhu, “Database Security—Concepts, Approaches, and Challenges,” *IEEE Transactions on Dependable and Secure Computing*, vol. 2, no. 1, pp. 2-19, 2005.
  4. M. Bishop, “Introduction to Computer Security,” Addison-Wesley, 2004.
  5. L. Lamport, “Password Authentication with Insecure Communication,” *Communications of the ACM*, vol. 24, no. 11, pp. 770-772, 1981.
  6. C. J. Date, *An Introduction to Database Systems*, 8th ed., Addison-Wesley, 2003.
  7. P. P. Bonatti, S. Kraus, and V. S. Subrahmanian, “Foundations of Secure Deductive Databases,” *IEEE Transactions on Knowledge and Data Engineering*, vol. 7, no. 3, pp. 406-422, 1995.
  8. D. E. Denning, *Cryptography and Data Security*, Addison-Wesley, 1982.
  9. J. Gray and A. Reuter, *Transaction Processing: Concepts and Techniques*, Morgan Kaufmann, 1993.
  10. Foster E, Godbole S. Database systems: a pragmatic approach. Auerbach Publications; 2022 Sep 26.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03
Received May 18, 2024
Accepted June 11, 2024
Published August 21, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.